All Topics

Find Answers
Ask questions. Get answers. Find technical product solutions from passionate members of the Splunk community.

All Topics

  In the above, I am comparing the last 15m data to the current week's 15m data. And I am getting good results.     But here in the same search when I am using the filter search Dev... See more...
  In the above, I am comparing the last 15m data to the current week's 15m data. And I am getting good results.     But here in the same search when I am using the filter search Device_Type="mobile", I am not getting the last week of data in graph. Please help me out for this.    
Hello, I have a monthly report that produce a table like this Violation list Employee month A 8-2022 B 8-2022   I want to add a counter to count for consecutiv... See more...
Hello, I have a monthly report that produce a table like this Violation list Employee month A 8-2022 B 8-2022   I want to add a counter to count for consecutive occurrences. For example: In September report (9-2022) - employee A violated, his counter increase to 2 - employee B don't violate, don;t show up in report - employee C violated, first time show up on report, his counter is 1 In October report (10-2022) - employee A violated again, his counter increase to 3 - employee B violated again, but don't show up on September report, his counter reset to 1. - employee C violated again, his counter increase to 2 I want the end table to look like this Employee month Counter A 10-2022 3 B 10-2022 1 C 10-2022 2 Since the report was a outputlookup csv, I don't think I can use streamstat, Can anyone suggest a way to do this.
Is there a way to add a horizontal reference line to a boxplot chart. The chart uses the Machine Learning Toolkit custom visualization boxplot chart and features multiple box plots next to each other... See more...
Is there a way to add a horizontal reference line to a boxplot chart. The chart uses the Machine Learning Toolkit custom visualization boxplot chart and features multiple box plots next to each other. I would like to add a line to show when boxplot's whisker crosses over a threshold line, but there is very little customization using the UI for the visualization. Is there some way to add this line to this type of plot using the XML source in the dashboard editor?
I have a Bash script on our deployment server. The directory tree and the inputs.conf file: bin bash_script.sh local inputs.conf app.conf The inputs.conf file: [script://./bin/bash_scr... See more...
I have a Bash script on our deployment server. The directory tree and the inputs.conf file: bin bash_script.sh local inputs.conf app.conf The inputs.conf file: [script://./bin/bash_script.sh] interval = -1 I restart the deployment server. I then check one of the servers I have this app deployed to: index="_internal" bash-script sourcetype=splunkd host="specific-hostname" message from "/opt/splunkforwarder/etc/apps/bash_script/bin/bash_script.sh" /bin/sh: 1: /opt/splunkforwarder/etc/apps/bash_script/bin/bash_script.sh: Permission denied That path and file does exist on the destination server. What am I missing?
I am trying to add a percentage to the total row generated by addcoltotals. I would like to show the total percentage of successes for a search using top. addcoltotals seems to only perform a sum and... See more...
I am trying to add a percentage to the total row generated by addcoltotals. I would like to show the total percentage of successes for a search using top. addcoltotals seems to only perform a sum and doesn't calculate total percentage properly, so leaving "%" off the percentage values would result in it becoming 120 in the final cell. Currently generated table: user Total Successful Total Failed Total Calls Success Percentage Maynard 2 3 5 40.00% Keenan 8 2 10 80.00% TOTALS 10 5 15   Ideally the currently empty cell would display 66.67%. Query:   search string | top 0 countfield=Count percentfield=Percent status by user | eventstats sum(eval(if(match(status, "2\d{2}"), Count, 0))) as success by user | eventstats sum(eval(if(match(status,"[45]\d{2}"), Count, 0))) as fail by user | eventstats sum(Count) as total by user | eval percent_success = round((success)/(total)*100, 2)."%" | stats values(success) as "Total Successful" values(fail) as "Total Failed" values(Total) as "Total Calls" values(percent_success) as Success Percentage by user | addcoltotals labelfield=user label=TOTALS   The ."%" prevents the addcoltotals from summing the values, leaving the bottom right cell blank.   Is there a way to override the sum functionality of addcoltotals? Or is there a way to manually add a row to a table generated by stats where I can just calculate the values manually? Would it be possible to overwrite just the empty cell with a percentage calculation I do myself?  
Hey all, Can someone help me out with a JSON related question! Many many thanks! I have a JSON arrays field in this format results=<200 OK OK, { "tnPortingActivityInProgress" : "N", "avai... See more...
Hey all, Can someone help me out with a JSON related question! Many many thanks! I have a JSON arrays field in this format results=<200 OK OK, { "tnPortingActivityInProgress" : "N", "availableActions" : [ { "accountAction" : "Restart", "actionAvailable" : "N", "actionNotAvailableReason" : "Account is Active" }, { "accountAction" : "Multi-AP Salable", "actionAvailable" : "Y" }, { "accountAction" : "Seasonal Suspend", "actionAvailable" : "Y" } ], "transactionId" : "1234567" } ,[]> I would love to parse the json array into this format.  transactionId aaccountAction    actionAvailable  actionNotAvailableReason 1234567 Restart N Account is Active 1234567 Multi-AP Salable Y   1234567 Seasonal Suspend                   Y     I have tried a query like this. As you can see, the data is stacked in the same row right now, which is not working in my case  as I have no idea what actionAvailable & actionNotAvailableReason for what accountActions.  And also, the search is not working either if we do like this.   
I have this query that gets current CURRENT_OUT counts by DISTRICT index=<my index> sourcetype=oracle:query source=<source> | fields DISTRICT, OUT_CUSTS | where _time>relative_time(now(),"-5m") | s... See more...
I have this query that gets current CURRENT_OUT counts by DISTRICT index=<my index> sourcetype=oracle:query source=<source> | fields DISTRICT, OUT_CUSTS | where _time>relative_time(now(),"-5m") | stats sum(OUT_CUSTS) as CURRENT_OUT by DISTRICT | table DISTRICT, CURRENT_OUT | sort by DISTRICT This works to get current counts because the db source is updated every 5 minutes in splunk DB connect.  I get a nice table of CURRENT_OUT by DISTRICT. Is is possible to expand this to add a peak value for CURRENT_OUT over, say, the last 24 hours, while still including the current CURRENT_OUT value in the table as well?  I'm looking at the bin command but I can't put it together.  Once I expand my timeframe for my query, I'm bringing back way too much data an overinflating the current CURRENT_OUT  values for each DISTRICT.  Thanks  
I created a column chart and I want to add a line on the y-axis as the upper limit that increases by 300 every 6 hours (pink line in image attached). How would I do this? -->Is there an option dis... See more...
I created a column chart and I want to add a line on the y-axis as the upper limit that increases by 300 every 6 hours (pink line in image attached). How would I do this? -->Is there an option display line I can add in dashboard under my chart code?  
Hello, My Splunk environment is integrated with Active Directory for Logins per DoD STIG Requirement.  However one of the Active Directory STIGs requires AD accounts to be disabled if not logged in... See more...
Hello, My Splunk environment is integrated with Active Directory for Logins per DoD STIG Requirement.  However one of the Active Directory STIGs requires AD accounts to be disabled if not logged in the past 30 days.  And it does not seem that logging in via Splunk notifies AD that the user has logged in.  Please help as I have certain users that only login via the Splunk UI and every month AD is disabling their accounts. Thanks David
We are using 8.2.3 with SHC and multisite indexer clustering. We have some mismatch on key business data and we need to delete and reload some data from the summary index only for a few days. The... See more...
We are using 8.2.3 with SHC and multisite indexer clustering. We have some mismatch on key business data and we need to delete and reload some data from the summary index only for a few days. The below search returns data which is wrong and to be deleted. Search:  index=INDEXNAME sourcetype=stash source=SOURCENAME datasource="DATASOURCENAME" host=HOSTNAME But when I add "| delete" for the search above.  It deletes 0 events and no error. This worked a few months ago but not today so I reckon there's no config issues, like capability and deleteIndexesAllowed has been configured for the index already.
Some KOs are not found on the GUI > Settings > Searches, Reports and alerts > "search" with its name. The version  we currently operate is 8.2.1 and SH Clustered. This happens quite frequently for ... See more...
Some KOs are not found on the GUI > Settings > Searches, Reports and alerts > "search" with its name. The version  we currently operate is 8.2.1 and SH Clustered. This happens quite frequently for mostly the alerts we make changes to the search strings.
Hi community! I have a dashboard that shows the alerts on table and in the graph, the questions is How I can link each fired alert to respective saved search? I paste one image  
Hello community, since a couple of months ago we are having an issue into Splunk and is so weird... The issue is that we are working as usual and suddenly we lost the session and when we refresh ... See more...
Hello community, since a couple of months ago we are having an issue into Splunk and is so weird... The issue is that we are working as usual and suddenly we lost the session and when we refresh the UI is shown like the image below: So as you can see the menu at the right top is broken and also the icon is broken. Also if you try to click one of the available option, don't work. We have a cluster search head and a Load Balancer.   If you have any idea I'll really appreciate it.   Thanks in advance. Version 8.2.2
Hello, I have an existing json object and I'd like to merge another json object into it. I don't want to combine them into an array. I'd like them merged. Any ideas how I'd do this?     | eval ... See more...
Hello, I have an existing json object and I'd like to merge another json object into it. I don't want to combine them into an array. I'd like them merged. Any ideas how I'd do this?     | eval object1=json_object("somekey","value")         | eval object2=json_object("someOtherKey","value")     Combined Value:     {"somekey":"value","someOtherKey":"value"}        
I want to send an alert when a situation has been corrected. for example If i setup an alert for low diskspace on a host and I set this alert up to check every 15 minutes, with range back 15 minutes.... See more...
I want to send an alert when a situation has been corrected. for example If i setup an alert for low diskspace on a host and I set this alert up to check every 15 minutes, with range back 15 minutes. I will get an alert until I correct the low disk issue on the host. but what I want is that when the problem is corrected, splunk somehow would know that it needs to send an "Alert resolved" out. The problem is I only want it to send that "Alert resolved" message out only after an alert was sent out that it was a problem. I would think that somehow a flag for an alert would need to be set when an alert is thrown so that when the condition is corrected, Splunk has a way to know that the previously it was a problem and it would send the "Alert resolved" alert Anyone know of a way to do this? Gary  
I have created a multiselect input using a dynamic list:       <input type="multiselect" token="my_id" searchWhenChanged="true"> <label>My ID</label> <fieldForLabel>my_id</fieldForLab... See more...
I have created a multiselect input using a dynamic list:       <input type="multiselect" token="my_id" searchWhenChanged="true"> <label>My ID</label> <fieldForLabel>my_id</fieldForLabel> <fieldForValue>my_id</fieldForValue> <search> <progress> <condition match="'job.resultCount'==1"> <set token="form.my_id">$result.my_id$</set> <set token="my_id">$result.my_id$</set> </condition> </progress> <query>| tstats values(my_id) as my_id where index=my_index sourcetype IN (my_sourcetype) | mvexpand my_id | table my_id | dedup my_id</query> <earliest>$time.earliest$</earliest> <latest>$time.latest$</latest> </search> <valuePrefix>"</valuePrefix> <valueSuffix>"</valueSuffix> <delimiter>, </delimiter> </input>           I also have a Pie Chart:       <row> <panel> <title>Total Vulnerabilities by My ID</title> <chart> <search base="base_search"> <query>| stats count by my_id</query> </search> <option name="charting.axisTitleX.visibility">visible</option> <option name="charting.axisTitleY.visibility">visible</option> <option name="charting.axisTitleY2.visibility">visible</option> <option name="charting.axisY.abbreviation">auto</option> <option name="charting.chart">pie</option> <option name="charting.chart.nullValueMode">zero</option> <option name="charting.chart.stackMode">stacked</option> <option name="charting.drilldown">all</option> <option name="charting.legend.labelStyle.overflowMode">ellipsisEnd</option> <option name="charting.legend.placement">right</option> <option name="link.exportResults.visible">$exportResults$</option> <option name="link.inspectSearch.visible">$inspectSearch$</option> <option name="link.openPivot.visible">$openPivot$</option> <option name="link.openSearch.visible">$openSearch$</option> <option name="refresh.display">progressbar</option> <drilldown> <set token="form.my_id">$click.value$</set> </drilldown> </chart> </panel>       I would like to HIDE the panel (not the row) in the event only value is selected from the multiselect.  I would like to SHOW the panel (not the row) in the event more than one value is selected from the multiselect. Is this possible?  I have seen this accomplished for static lists, but I am unable to use a static list in this instance.  Thank you.
We have alert events coming into Splunk & Splunk ITSI that we open Service Now incidents for, but depending on the event contents the incident will need to be routed to different teams. An example s... See more...
We have alert events coming into Splunk & Splunk ITSI that we open Service Now incidents for, but depending on the event contents the incident will need to be routed to different teams. An example scenario is, if the alert comes from server A then set the Service Now assignment group to team A, alerts from all other servers should go to team B. We will have many of these scenarios in our environment, what is the best way to do this?   Thanks in advance!
Hi, I was looking at the latest version for Linux Auditd App & Add-on. Both are listed as 3.1.2 at the source https://github.com/doksu/splunk_auditd but only Add-on shows latest version on Splunkbas... See more...
Hi, I was looking at the latest version for Linux Auditd App & Add-on. Both are listed as 3.1.2 at the source https://github.com/doksu/splunk_auditd but only Add-on shows latest version on Splunkbase. App is still at 3.1.0. https://splunkbase.splunk.com/app/4232 - Add-on - Version 3.1.2 https://splunkbase.splunk.com/app/2642 - App - Version 3.1.0 Should I be downloading App directly from Github? Thanks
I am probably overengineering this but this is the only way I could get a script to execute on UF, via a deployed application's bin folder I have a .path file which executes powershell.exe -comma... See more...
I am probably overengineering this but this is the only way I could get a script to execute on UF, via a deployed application's bin folder I have a .path file which executes powershell.exe -command "& 'path_to_ps1_script'" and it's placed, as stated, in myapp\bin\scripts folder The PS1 script, returns a valid JSON. The app's inputs.conf stanza: [script://$SPLUNK_HOME\etc\apps\<my app>\bin\scripts\myscript.path] disabled=false interval=60 sourcetype=my_source_type source=my_source send_index_as_argument_for_path=false index=my_index As soon as I put index=my_index in my stanza, the data is not being indexed for some reason. If I remove the index, the data is indexed into the default "main" index, however i'm looking for a solution to send that data to an index I specify   Any suggestions ?  
Greetings. Is it possible merge 2 search? If there is any common value than connect it. If there is no match keep the events with null()'s I have tired with join function, but the join funct... See more...
Greetings. Is it possible merge 2 search? If there is any common value than connect it. If there is no match keep the events with null()'s I have tired with join function, but the join function are drop those events where there is no match.